Sort
Micro Focus - Voltage delivers data-centric security software solutions to protect data across enterprise, cloud, mobile devices, and big data environments. Voltage provides best-in-class data encryption and tokenization for structured and unstructured data and enables cost-effective PCI compliance, scope reduction, and secure analytics. Voltage solutions are used by leading enterprises...
Rank
1
Vote
Sponsor
0.0
"G DATA has introduced a highly flexible, future-oriented security solution," which is managed via Microsoft Cloud Germany. - Maik Morgenstern, CEO of AV-TEST. That G DATA IT security solutions provide best attack detection rates for effectively combating Trojans, malware and even unknown viruses. G DATA customer support is available 24/7/365, with support teams and the G DATA SecurityLab...
Rank
2
Vote
Sponsor
0.0
As Featured on "Manufacturing Marvels" on FOX Business Network Data Security, Inc. is the world’s leading manufacturer of electronic information disposal equipment. Based in Lincoln, Nebraska, we design, manufacture and retail specialized equipment that keeps private information, private. Our...
Rank
3
Vote
Sponsor
0.0
Concerned about data security & encryption to protect your business? WinMagic's SecureDoc software will ensure that you feel secure & protected. Learn More. For individual users seeking uncompromising data protection for their Windows-based desktops and laptops, keeping sensitive information...
Rank
4
Vote
Sponsor
0.0
German Quality virus protection: G DATA Antivirus, G DATA Internet Security and G DATA Total Protection. Test our award-winning malware protection now! "G DATA has introduced a highly flexible, future-oriented security solution," which is managed via Microsoft Cloud Germany. - Maik Morgenstern,...
Rank
5
Vote
Sponsor
0.0
IT Security News and Information Security News, Cyber Security, Network Security, Enterprise Security Threats, Cybercrime News and more. Information Security Industry Expert insights and analysis from IT security experts around the world. While there are clear security benefits gained through network segmentation, the principal goal of creating subnets is to improve performance, avoiding...
Rank
6
Vote
Sponsor
0.0
Industry leading HSMs, Key Management, Network Encryption, Time Stamping, & other data security solutions that deliver operational efficiency. Training and certification services provide your team with the knowledge and skills they need to design effective security strategies, utilize Thales e-Security products with confidence, and maximize the ROI in data protection solutions. NShield HSMs...
Rank
7
Vote
Sponsor
0.0
Protegrity is enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability. We have trusted Protegrity’s solution to make sure that private financial and personal information is secured across our enterprise, internally and externally, and to keep us in compliance with regulations and policies. Protegrity...
Rank
8
Vote
Sponsor
0.0
Informatica delivers enterprise data integration and management software powering analytics for big data and cloud. Unlock data's potential. We've got you covered. Enter your email address, and we'll send you a link to reset your password. Join industry experts as they share best practices at our virtual summit. Start the registration process by entering your email address below.
Rank
9
Vote
Sponsor
0.0
Information security is critical to organizational success. Get strong digital security with Entrust’s array of identity-based data security solutions. Entrust has been at the forefront of the identity-based digital information security market for nearly two decades. Our identity-based data security solutions secure governments, enterprises and financial institutions in more than 5,000...
Rank
10
Vote
Sponsor
0.0
Find the latest security analysis and insight from top IT security experts and leaders, made exclusively for security professionals and CISOs. To protect their organizations from an insider threat, IT managers should take steps to reduce exposure of data and enhance detection capabilities. IT managers should consider a provider's quality of SOC staffing, flexibility and ability to meet business...
Rank
11
Vote
Sponsor
0.0
Financial Institutions are expanding their mobile strategy as customer adoption of mobile banking continues to grow. Learn best practices in implementing and securing mobile applications and which security technologies will ensure the best user experience to drive loyalty. This webcast provides valuable lessons on these matters through expert insights from Stessa Cohen, Research...
Rank
12
Vote
Sponsor
0.0
Call United Data Security in Spokane, Washington, for data destruction services to protect your sensitive information. Call United Data Security in Spokane, Washington, for data destruction services to protect your sensitive information. Our data security specialists are some of the most trusted professionals in the industry, and we offer more than 22 years of experience in data security to...
Rank
13
Vote
Sponsor
0.0
Data security software from PKWARE secures data files at rest and in transit with passphrase or certificate-based encryption and cross-platform capability. Your browser identified itself as a version of IE that was often shipped with default settings that were less than secure. Your internet experience could be made more secure by opening Internet Options in your browser, going to the Advanced...
Rank
14
Vote
Sponsor
0.0
Infosecurity Magazine is the award winning online magazine dedicated to the strategy, insight and technology of information security. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies. Okay, I understand Learn more. This is an increase of 13,000 from the amount in...
Rank
15
Vote
Sponsor
0.0
We offer a full range of IT security services to ensure your organization is trained, compliant and protected against evolving cybersecurity threats. We recognize that every organization’s cybersecurity needs are unique, and that there's no such thing as a one-size-fits-all solution. From risk assessment to threat detection, Sage will help you make informed choices about the services that are...
Rank
16
Vote
Sponsor
0.0
In a blog post published today, Austrian security firm SEC Consult said it found two apparent backdoor accounts in Sony IPELA Engine IP Cameras — devices mainly used by enterprises and authorities. According to SEC Consult, the two previously undocumented user accounts — named “primana” and “debug” — could be used by remote attackers to commandeer the Web server built into these devices, and...
Rank
17
Vote
Sponsor
0.0
Healthcare Information Security News on HIPAA Compliance, BYOD, Data Security, Cybersecurity, Patient Privacy and Data Breaches for Hospitals and Providers. - In working with some of the largest healthcare organizations in the world, there has been a common theme when conversations around healthcare data centers come about. Specifically, many organizations are now asking: Just how agile is my...
Rank
18
Vote
Sponsor
0.0
BankInfoSecurity.com is your source for banking information security related content, including fraud, ID theft, risk management, emerging technology (authentication, cloud computing, mobile banking, social media), as well as the latest regulations and anlysis on current topics. Hours after President Obama directed intelligence agencies to conduct a full review of alleged efforts by the...
Rank
19
Vote
Sponsor
0.0
Information security services firm with specialization in Data-Centric Security, Data Loss Prevention (DLP) and File Activity Monitoring (FAM). Taking your product to market is one thing, taking your Cloud Service to the federal market space is a total other. The federal government’s requirements for information assurance compliance, operations, monitoring and reporting are nearly unprecedented...
Rank
20
Vote
Sponsor
0.0